The Intelligent Shield. OpenCTI
OpenCTI deployment and AI-driven enrichment guide covering STIX 2.1, connectors, feeds, confidence scoring, hardening, and operational runbooks.
Medium blog navigation
A Docusaurus navigation layer for Andrey Pautov's Medium articles: newest posts, deep CTI guides, AI-assisted security workflows, red-team labs, malware analysis, cloud security, and role-based reading paths.
Latest from RSS
RSS snapshot analyzed on 2026-05-21. Labels are based on available body length and article role.
OpenCTI deployment and AI-driven enrichment guide covering STIX 2.1, connectors, feeds, confidence scoring, hardening, and operational runbooks.
Entry point for the CTI Analyst Field Manual, intended as a reference map rather than a single deep technical walkthrough.
Overview and workflow quick reference for a gate-controlled CTI-to-detection project model.
Reference toolkit for CTI-to-detection execution, including artifacts, validation gates, and reusable delivery material.
Phase-by-phase implementation guide for moving from intelligence requirements to hunts, detections, and customer delivery.
Foundational methodology for a customer-driven AI CTI lifecycle with strict validation gates.
Practical guide to evidence discipline, confidence language, and analytic integrity for CTI production.
End-to-end telecom case study for core network, cloud operations, SOC/NOC, identity, third-party access, and executive decision support.
Analyst-oriented guide to using kill-chain thinking with real-world evidence and defensible CTI structure.
Side-by-side comparison of manual CTI work and AI-assisted CTI, focused on which steps compress and which risks remain.
Original order + tags
OpenCTI deployment and AI-driven enrichment guide covering STIX 2.1, connectors, feeds, confidence scoring, hardening, and operational runbooks.
Entry point for the CTI Analyst Field Manual, intended as a reference map rather than a single deep technical walkthrough.
Overview and workflow quick reference for a gate-controlled CTI-to-detection project model.
Reference toolkit for CTI-to-detection execution, including artifacts, validation gates, and reusable delivery material.
Phase-by-phase implementation guide for moving from intelligence requirements to hunts, detections, and customer delivery.
Foundational methodology for a customer-driven AI CTI lifecycle with strict validation gates.
Practical guide to evidence discipline, confidence language, and analytic integrity for CTI production.
End-to-end telecom case study for core network, cloud operations, SOC/NOC, identity, third-party access, and executive decision support.
Analyst-oriented guide to using kill-chain thinking with real-world evidence and defensible CTI structure.
Side-by-side comparison of manual CTI work and AI-assisted CTI, focused on which steps compress and which risks remain.
Practical guide to static APK analysis with YARA, semantic scoring, VirusTotal, multi-provider AI, and Frida hooks.
Evidence-based research report on attacker AI use, named incidents, provider disclosures, TTPs, and forecast judgments.
Attribution framework covering evidence types, confidence, false flags, cluster-level vs incident-level claims, and common mistakes.
Practitioner guide for using ATT&CK in CTI mapping, gap analysis, detection engineering, hunting, and emulation.
Field guide for pivoting from a single IOC through passive DNS, reverse IP, ASN reuse, TLS certificates, and internet-wide search.
Practical guide to CVSS-B, CVSS-BT, CVSS-BTE, KEV, EPSS, environmental scoring, and operational prioritization.
Engineering walkthrough for AIDebug: FLIRT matching, malware pattern detection, CFG visualization, Frida hooks, and reporting.
Engineering walkthrough for a multi-cloud scanner with AWS and GCP modules, LLM routing, Terraform deployment, and tests.
Complete topic navigation
These groups mirror the original Medium master index order and give direct section links for the full 100+ article map.
Threat intelligence tradecraft, actor research, telecom threat mapping, attribution, infrastructure pivoting, ATT&CK, and CTI-to-detection work.
Big-picture AI security, HexStrike-AI setup, MCP/Cursor workflows, Gemini/OpenAI/Llama configuration, and productivity frameworks.
Hands-on AI-assisted pentesting workflows for network discovery, web apps, wireless, SMB/SSH, password recovery, cloud scanning, and lab exploitation.
Burp Suite, scanner interpretation, MCP integrations, payload planning, and classic web scanner guides.
Target discovery, Shodan, Censys, theHarvester, Sublist3r, Amass, SpiderFoot, WhatWeb, and LLM-assisted recon planning.
Nmap fundamentals, service detection, version probing, scripts, scan strategy, and network assessment syntax.
Traditional web testing with OWASP ZAP, SQLMap, DirBuster, Nikto, and staged reconnaissance-to-scanning methodology.
Metasploit foundations, auxiliary modules, exploit modules, and practical SSH/FTP/Telnet exploitation workflows.
John the Ripper, Hashcat, Hydra, WiFi cracking, PDF/Office/ZIP recovery, RDP, RTSP, and custom wordlist generation.
AD penetration testing, ADCS ESC8, certificate abuse, lab deployment, and MITRE ATT&CK tool mapping for red teams.
GCP pentesting, vulnerable cloud labs, Kubernetes lab design, black-box K8s playbooks, and cloud-native detection.
Vulnerable Ubuntu and Windows labs, IIS/SharePoint lab, DVWA automation, DragonRx, vulnerable AI lab, and one-prompt training environments.
Static malware analysis, file metadata, strings, obfuscation, automated triage tools, Android APK analysis, and AI-assisted forensics.
Endpoint hunting, protocol-level hunting, Pyramid of Pain, single-event and correlation detection rules, and CI/CD defense.
Building security tools and payload workflows with Cursor AI, including Android Rubber Ducky payloads and Arduino Leonardo hardware builds.
SOC Tier 1 onboarding, awareness, phishing protection, OWASP Top 10 secure coding, server hardening, and baseline PT toolkits.
Fluent Bit, AWS EKS log shipping, Kubernetes DaemonSets, EKS control-plane logs, XPLG integration, and Linux reporting tools.
Feedback, future topic requests, and meta-navigation material for the blog.
Direct links
This list follows the original navigator group order. When an exact article URL is not verified, the link opens the correct section in the Medium master index.